Vulnerabilities
Vulnerable Software
Apache:  >> Cloudstack  >> 4.5.1  Security Vulnerabilities
Apache CloudStack 4.1 to 4.8.1.0 and 4.9.0.0 contain an API call designed to allow a user to register for the developer API. If a malicious user is able to determine the ID of another (non-"root") CloudStack user, the malicious user may be able to reset the API keys for the other user, in turn accessing their account and resources.
CVSS Score
9.8
EPSS Score
0.015
Published
2018-02-06
Apache CloudStack 4.5.x before 4.5.2.1, 4.6.x before 4.6.2.1, 4.7.x before 4.7.1.1, and 4.8.x before 4.8.0.1, when SAML-based authentication is enabled and used, allow remote attackers to bypass authentication and access the user interface via vectors related to the SAML plugin.
CVSS Score
6.5
EPSS Score
0.003
Published
2016-06-10
Apache CloudStack before 4.5.2 does not properly preserve VNC passwords when migrating KVM virtual machines, which allows remote attackers to gain access by connecting to the VNC server.
CVSS Score
9.8
EPSS Score
0.019
Published
2016-02-08
Apache CloudStack before 4.5.2 might allow remote authenticated administrators to obtain sensitive password information for root accounts of virtual machines via unspecified vectors related to API calls.
CVSS Score
4.9
EPSS Score
0.002
Published
2016-02-08


Contact Us

Shodan ® - All rights reserved